Filters
Question type

Study Flashcards

A(n) ___________ allows data that is being read or tansmitted to be checked for errors and, when necessary, corrected.


A) ECC
B) lattice code
C) CBC
D) superposition

Correct Answer

verifed

verified

Information in a quantum computer is represented as __________ .


A) qubits
B) qubytes
C) quinfo
D) qucis

Correct Answer

verifed

verified

An example of a lightweight cryptographic hash function is __________ .


A) SEA
B) Grain-128
C) PHOtON
D) CRYP17

Correct Answer

verifed

verified

the Iot depends heavily on deeply embedded systems.

Correct Answer

verifed

verified

Microcontrollers are heavily utilized in automation processes.

Correct Answer

verifed

verified

the _________ is designed to be stored on a RFID tag and it provides a universal identifier for every physical object anywhere in the world.


A) NtU
B) EPC
C) UPC
D) NAND

Correct Answer

verifed

verified

__________ proposed a technique that builds on the Lamport scheme, using the concept of a hash tree.


A) Shor
B) Grover
C) McEliece
D) Merkel

Correct Answer

verifed

verified

the __________ of a cryptographic key is the time span during which a specific cryptogrphic key is authorized for use for its defined purpose.

Correct Answer

verifed

verified

ISO 29192 defines a minimum security strength for lightweight cryptography of __________ bits.


A) 80
B) 128
C) 64
D) 112

Correct Answer

verifed

verified

__________ is a data collection technology that uses electronic tags attached to items to allow the items to be identified and tracked by a remote system.


A) RFID
B) NtRU
C) EPC
D) CRYPtOREC

Correct Answer

verifed

verified

A(n) __________ is a device with limited volatile and nonvolatile memory, limited processing power, and a low data rate transceiver.


A) microprocessor
B) class 3 device
C) Iot
D) constrained device

Correct Answer

verifed

verified

Cryptosystems that employ symmetric ciphers or hash functions cannot be made quantum safe.

Correct Answer

verifed

verified

__________ cryptography is concerned with the development of cryptographic algorithms that are secure against the potential development of quantum computers.

Correct Answer

verifed

verified

__________ systems are dedicated, single-purpose devices that detect something in the environment, perform a basic level of processing, and then do something with the results.

Correct Answer

verifed

verified

A __________ is a single chip that contains the processor, nonvolatile memory for the program, volatile memory for input and output, a clock, and an I/O control unit.

Correct Answer

verifed

verified

RFID devices require cryptographic algorithms that use a large amount of logic and memory.

Correct Answer

verifed

verified

An example of a lightweight cryptographic block cipher is the Scalable Encryption Algorithm.

Correct Answer

verifed

verified

For both block and stream ciphers, the implementation to meet design goals makes use of one of three major hardware architecture options: parallel (loop unrolled), round-wise (rolled), and __________ .

Correct Answer

verifed

verified

the most widely studied __________ is the NtRU family of cryptographic algorithms.


A) lattice-based approach
B) code-based approach
C) hash-based approach
D) multivariate polynomial approach

Correct Answer

verifed

verified

Post-quantum cryptography is concerned with the security of asymmetric cryptographic algorithms.

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer